The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime numbers and the possibility of using integer numbers. While the second branch of the proposal is the multi-key encryption algorithm. The current algorithm provides the ability to use more than two keys. Keys can be any kind of integer number (at least the last key is a prime number), not necessarily to be of the same length. The Encryption process is based on converting the text characters to suggested integer numbers, and these numbers are converted to other numbers by using a multilevel mathematical model many times (a multilevel process depending on the number of keys used), while the decryption process is a one-level process using just one key as the main key, while the other keys used as secondary keys. The messages are encoded before encryption (coded by ASCII or any suggested system). The algorithm can use an unlimited number of keys with a very large size (more than 7500 bytes), at least one of them a prime number. Exponentiation is also used for keys to increase complexity. The experiments proved the robustness of the key exchange protocol and the encryption algorithm in addition to the security. Comparing the suggested method with other methods ensures that the suggested method is more secure and flexible and easy to implement.
Background: Preoperative radiographical assessment of the maxillofacial lesions is of a great importance in guiding the surgeon during surgical procedure in reducing post-operative complications. This study highlighted the application of CBCT scan in the assessment of maxillofacial cystic and cystic like lesions as a part of advanced radiology Materials and methods: A total of 20 patients (15 males and 5 females) participated in this prospective study. CBCT scan (Kodak 9500 CBCT) with (DICOM) software utilized to perform scanning to all patients in order to assess lesion extension, morphological features and it’s relation to the adjacent vital structures. Results: In this study, the total cystic and cystic like lesions involving the
... Show MoreThe presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two
... Show MoreIn hemodialysis patients, pain associated with needle insertion into an arteriovenous fistula is a physical and psychological problem. The aim of this study was to assess the effectiveness of pre‐puncture application of an ice pack, EMLA cream, or lidocaine spray to reduce pain associated with access puncture.
This was a multicenter study done in nine hemodialysis centers in Iraq. The study utilized a randomized, parallel‐group design, in which patients being dialyzed using an arteriovenous access were allocated into one of four groups. Access puncture was preceded by nothing (contr
The nucleon momentum distributions (NMD) and elastic electron scattering form factors of the ground state for some 1f-2p-shell nuclei, such as 58Ni, 60Ni, 62Ni, and 64Ni
isotopes have been calculated in the framework of the coherent fluctuation model (CFM) and expressed in terms of the weight function lf(x)l2 . The weight function (fluctuation function) has been related to the nucleon density distribution (NDD) of the nuclei and determined from the theory and experiment. The NDD is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of the l
A robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreThis study proposes a hybrid predictive maintenance framework that integrates the Kolmogorov-Arnold Network (KAN) with Short-Time Fourier Transform (STFT) for intelligent fault diagnosis in industrial rotating machinery. The method is designed to address challenges posed by non-linear and non-stationary vibration signals under varying operational conditions. Experimental validation using the FALEX multispecimen test bench demonstrated a high classification accuracy of 97.5%, outperforming traditional models such as SVM, Random Forest, and XGBoost. The approach maintained robust performance across dynamic load scenarios and noisy environments, with precision and recall exceeding 95%. Key contributions include a hardware-accelerated K
... Show MoreFour electrodes were synthesized based on molecularly imprinted polymers (MIPs). Two MIPs were prepared by using the diclofenac sodium (DFS) as the template, 2-hydroxy ethyl metha acrylate(2-HEMA) and 2-vinyl pyridine(2-VP) as monomers as well as divinyl benzene and benzoyl peroxide as cross linker and initiator respectively. The same composition used for prepared non-imprinted polymers (NIPs) but without the template (diclofenac sodium). To prepared the membranes electrodes used different plasticizers in PVC matrix such as: tris(2-ethyl hexyl) phosphate (TEHP), tri butyl phosphate (TBP), bis(2-ethyl hexyl) adipate (BEHA) and tritolyl phosphate (TTP). The characteristics studied the slop, detection limit, life time and linearity range of DF
... Show MoreThis study presents a rapid, sensitive, and straightforward approach to measure chlorpheniramine maleate (CPM) by using turbidity CFIA. The method involves CPM reacting with sodium nitroprusside (Nitropress) to produce a pale white precipitate. The NAG-SSP-5S1D analyzer was used to measure turbidity at 0°–180° angle to detect the attenuation of incident light as a result of collision on the surfaces of the precipitate particles. The linear range of CPM measurements was between 0.008 and 11 m.mol/L, with correlation coefficient of 0.9983 and R2% = 99.65. The limit of detection was determined to be 0.0328 µg/sample from the lowest concentration in the calibration curve, and the repeatability of the method (RSD%) was less than 0.4% (n = 6
... Show More